{"title":"A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory","authors":"I. Józwiak, A. Liber, K. Marczak","doi":"10.1109/ICCGI.2007.2","DOIUrl":null,"url":null,"abstract":"Software piracy is the illegal reproduction and distribution of software applications, whether for business or personal use. Globally, businesses and consumers will spend $300 billion on PC software over the next four years, according to International Data Corporation (IDC) estimates. Given the current market growth by country and current country-level piracy rates, during the same four-year period, we can expect almost $200 billion worth of PC software to be pirated. Protecting application against not authorized copying using program solutions is impossible. If there is a possibility to start program, there is also a possibility to crack it. Cracking means that application can be used without being registered or to the application there is a mechanism added which enables to obviate implemented there protections (for example: generator of serials codes). The device protection of software (dongles) has existed on the market for many years and it has functioned as devices protecting the software against not authorized copying and usage. For the application to work without device's key, the intruder has to modify it or emulate the presence of device's key. The dissertation presents tools and techniques used to break devices' protection of software with memory. The issue of software protection against not authorized copying, using devices' solutions is not a popular subject of scientific publications. The dissertations provides information about the applied methods and techniques of breaking the hypothetical construction of device's protection used the constructed electronic devices. The research is the introduction to designing the hardware protection of programmes resistant to well-known methods of breaking through safety of electronic devices' keys.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCGI.2007.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Software piracy is the illegal reproduction and distribution of software applications, whether for business or personal use. Globally, businesses and consumers will spend $300 billion on PC software over the next four years, according to International Data Corporation (IDC) estimates. Given the current market growth by country and current country-level piracy rates, during the same four-year period, we can expect almost $200 billion worth of PC software to be pirated. Protecting application against not authorized copying using program solutions is impossible. If there is a possibility to start program, there is also a possibility to crack it. Cracking means that application can be used without being registered or to the application there is a mechanism added which enables to obviate implemented there protections (for example: generator of serials codes). The device protection of software (dongles) has existed on the market for many years and it has functioned as devices protecting the software against not authorized copying and usage. For the application to work without device's key, the intruder has to modify it or emulate the presence of device's key. The dissertation presents tools and techniques used to break devices' protection of software with memory. The issue of software protection against not authorized copying, using devices' solutions is not a popular subject of scientific publications. The dissertations provides information about the applied methods and techniques of breaking the hypothetical construction of device's protection used the constructed electronic devices. The research is the introduction to designing the hardware protection of programmes resistant to well-known methods of breaking through safety of electronic devices' keys.